WO2007113746A1 - Watermark embedding using look-up tables - Google Patents
Watermark embedding using look-up tables Download PDFInfo
- Publication number
- WO2007113746A1 WO2007113746A1 PCT/IB2007/051107 IB2007051107W WO2007113746A1 WO 2007113746 A1 WO2007113746 A1 WO 2007113746A1 IB 2007051107 W IB2007051107 W IB 2007051107W WO 2007113746 A1 WO2007113746 A1 WO 2007113746A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- watermark
- data signal
- entries
- decryption
- signal
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0065—Extraction of an embedded watermark; Reliable detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
Definitions
- the invention relates to a method and device for embedding a watermark in a data signal, and in particular to embedding a watermark in the signal using look-up tables. Moreover, the invention relates to methods and devices for detecting a watermark in a data signal, as well as to computer readable code for implementing the methods of the invention.
- Digital watermarking has proven an effective deterrent against illegal distribution of copyrighted material in digital form, for instance over computer networks, via electronic content distribution (ECD) applications or via hand-to-hand public distribution.
- ECD electronic content distribution
- Forensic tracking watermarks are embedded in multimedia content to trace distributed copies of the content.
- Embedding watermarks in multimedia content is a complex operation in terms of computer power.
- Large-scale deployment of forensic tracking watermarks requires an efficient, scalable system of embedding watermarks and distributing the watermarked contents.
- Client-side embedding solves the scalability problem, since the server's processing load is distributed to the clients.
- a common unmarked copy can be broadcast - or multicast, cached at intermediate nodes, etc.
- the inventors of the present invention have appreciated that an improved means of handling watermarking of digital content is of benefit, and has in consequence devised the present invention.
- the inventors have had the insight that the method of the prior art deals with bit modifications of the data stream in the form of exclusive-or operations, and is thereby fragile to removal of the watermark.
- the present invention seeks to provide an improved means for copyright protection, and preferably, the invention alleviates, mitigates or eliminates one or more disadvantages of the prior art, singly or in any combination.
- a method for embedding a spread spectrum watermark in a data signal comprising: receiving an encrypted data signal, the data signal being encrypted by modifying the data signal in accordance with one or more entries of an encryption table; receiving a decryption table, the decryption table being a modified version of the encryption table; and decrypting the data signal in accordance with entries of the decryption table thereby embedding a watermark in the data signal.
- the method according to the invention embeds a spread spectrum watermark.
- the encrypted, watermarked or generally modified bits are spread or distributed over multiple bits. It is more robust than the prior art watermark, and can better be detected.
- the method includes a first step where the unmarked data signal is modified in accordance with one or more entries of an encryption table, and a second step where the encrypted signal is decrypted and watermarked in a single process.
- the decryption is based on a decryption table being a modified version of the encryption table.
- the modification is preferably obtained by applying, e.g. adding or multiplying, a watermark table to the encryption table.
- the encryption table may be randomly generated.
- the data signal may be a signal of, or a signal containing or including, audio, video, images, multimedia software, multidimensional graphical models, software structures, etc. singly or any combination.
- the data signal may be represented by a series of symbols, where a symbol of the data signal is to be understood as any representation of the data signal, such as a segments of the bit stream, a base-band signal, a DCT coefficient of the signal in the transform domain, etc.
- the present invention may be applied to each pixel value or a subset of pixel values in an image or video sequence, in this case the symbol of the signal may be the pixel values.
- the present invention may be applied to transform coefficients of the data signal, in this case the symbol of the signal may be the transform coefficients.
- the coefficient may be coefficient representing the amplitude, pitch or the like of the signal.
- the coefficients may also be coefficient of a specific encoding of the signal, such as MDCT coefficients, linear prediction coefficients, Fourier coefficient, etc.
- the invention according to the first aspect is particularly but not exclusively advantageous for a number of reasons.
- Spread spectrum watermarking is typically resistant to tampering, degradation and common signal processing operations, contrary to watermarking by means of bit-modifications, where at least some types of modifications may be removed by setting the modified bits to random values and thereby removing the watermark.
- the original unmarked data signal is not required. Only the watermark, typically in the form of a watermark table, and the corresponding entries of the decryption table may be needed.
- the watermark may be embedded in accordance with a perceptual mask, dictating the strength of the watermark at specific locations in the signal.
- the optional feature as defined in claim 2 is advantageous since the size of the input key may be considerably smaller than the size of the encryption, decryption or watermark table. For example compared to a method using one-time pads (OTP), the key size is significantly reduced.
- the optional features as defined in claim 3 describe an advantageous implementation of the method where the data signal is encrypted at a first computing system, such as a secure system, and wherein the data signal is decrypted and the watermark embedded at a second computing system, the second system not necessarily being a secure system.
- the decryption table may be generated at the first computing system or accessed by the first computing system, e.g. at another computing system communicatively connected to the first computing system.
- Claim 4 describes advantageous embodiments of embedding a watermark. It is an advantage of the present invention, that a watermark may be embedded both additively and multiplicatively in the signal.
- the optional feature as defined in claim 5 is advantageous since by basing the watermark table on a modified version of a reference watermark table a payload may be inserted.
- a series of decryption tables are generated based on a series of watermark tables
- the series of watermark tables may be modified versions of a reference watermark table.
- the modified version may be obtained by circularly shifting the reference watermark table, the shift representing a payload.
- a method of detecting a watermark in a data signal comprising: receiving a data signal possibly including a spread spectrum watermark, the possible watermark being embedded in accordance with entries of a decryption table; generating a sequence of indices corresponding to the entries of a watermark table, and constructing the watermark therefrom; detecting the presence of the watermark in the data signal.
- the method according to the second aspect of the invention is provided in accordance with detecting a watermark embedded by the method of the first aspect of the invention.
- the detection of the watermark may be obtained from a correlation of the data signal with the watermark.
- an estimated watermark be derived from the data signal and the presence of the watermark may be detected in the estimated watermark.
- the watermark to be detected may be generated from a watermark table and the sequence of entries.
- a method of detecting a watermark in a data signal comprising: receiving a data signal possibly including a spread spectrum watermark, the possible watermark being embedded in accordance with entries of a decryption table; generating a sequence of indices corresponding to the entries of the decryption table; accumulating segments of the data signal in an accumulation table at positions corresponding to the sequence of indices, thereby generating an accumulation table of the data signal; detecting the presence of the watermark in the accumulation table.
- the method according to the third aspect of the invention is provided in accordance with detecting a watermark embedded by the method of the first aspect of the invention.
- the method according to the third aspect of the invention is advantageous, since the accumulation table may be much shorter that the signal, thereby providing a faster detection process.
- the detection of the watermark may be obtained from a correlation of the accumulation table with the watermark table.
- an estimated watermark be derived from the data signal, and the presence of the watermark may be detected in the estimated watermark.
- the accumulation table may be constructed from the estimated watermark.
- a series of decryption tables generated based on a series of watermark tables the series of watermark tables being modified versions of a reference watermark table.
- the modified version may be obtained by circularly shifting the reference watermark table.
- the detection of the watermark may be obtained by a correlation of the accumulation table with the series of watermark tables, or from a correlation of the accumulation table with the reference table.
- a watermark embedder for embedding a spread spectrum watermark in a data signal.
- fifth and sixth aspects of the invention are watermark detectors for detecting the presence of a watermark possibly being embedded in a data signal.
- FIG. 1 schematically illustrates a scheme for embedding a watermark in a data signal
- FIG. 2 illustrates an embodiment of the encryption process
- FIG. 3 illustrates an embodiment of the decryption and watermarking process
- FIG. 4 schematically illustrates a scheme for detecting a watermark in a data signal
- FIG. 5 illustrates an embodiment of the detection procedure of FIG. 4
- FIG. 6 schematically illustrates another scheme for detecting a watermark in a data signal
- FIG. 7 illustrates an embodiment of the detecting procedure of FIG. 6.
- FIG. 1 schematically, in accordance with an embodiment of the invention, illustrates a scheme or process 10 for embedding a watermark in a data signal 4.
- FIG. 1 illustrates the embedding process in connection with a first computing device 15, such as a server device, and a second computing device 16, such as a client or user device.
- the watermark embedder is implemented so that a first part is present on the first computing device 15, whereas a second part is present on the second computing device 16.
- the unmarked data signal 4 such as a signal with video or audio content is received or accessed at a signal unit 17 at the server 15.
- the embedding process is conducted in two steps or parts, in a first part the signal is encrypted, this part is typically performed at the server 15, and in the second part, the signal is decrypted and the watermark is embedded, this part is typically performed at the client device 16.
- the input of the encryption process comprises inputting an input key 5 into a secure index generator 1 , the secure index generator being operable to generate a unique series of indices from the input key. Each index of the index generator is pointing to an entry in a look-up table 6.
- the look-up table is received by, accessed by or generated at the server by means of a table unit 2.
- the data is encrypted at an encryption unit 3 by modifying the data signal in accordance with the entries of the encryption table.
- the encrypted signal 9 is then distributed to a user.
- the encrypted signal 9 is receiving or accessing at signal unit 18 for receiving the encrypted data signal, the user-device, i.e. the client device, also receives or accesses the input key 5.
- the secure index generator 1 is capable of generating the same series of indices as used for encrypting the data signal.
- the client device receives or accesses a decryption table 8 at an encryption table unit 12, the decryption table being a watermarked version of the encryption table.
- the encrypted signal is decrypted at an embedding unit 13 by modifying the encrypted data signal in accordance with the corresponding entries of the decryption table. Because the decryption table is a watermarked version of the encryption table, the decrypted signal 14 is a watermarked version of the original input signal.
- the input key and the decryption table are distributed to the client via a secure communication channel, either separately or collectively.
- the input key and the decryption table are normally sent separate from the encrypted data signal.
- the signal may be distributed via a computer network, via an electronic content distribution (ECD) application, via a record carrier, such as a recordable or ROM optical record carrier or semiconductor or magnetic based carrier, etc.
- ECD electronic content distribution
- a user of the signal may then render or playback the signal on a device adapted for reading the data signal, such as on a CD-player, a DVD-player, a computer, a portable playback device, a game console, etc.
- the process of the present invention thus renders it possible to embed and distribute watermarked content in a secure, efficient and scalable manner.
- Handling of unmarked and unencrypted data may be done at a trusted site, e.g. by a trusted server device 15.
- Unmarked, but encrypted data is distributed to a potentially untrusted client 16, which locally performs the decryption and the watermarking of the data signal in a process where neither the unmarked content nor the watermark signal is exposed to the client. The user only gains accesses to the input key and the decryption table.
- FIG. 2 illustrates an embodiment of the encryption process 20 in accordance with the embedding scheme of FIG. 1.
- the watermarking is based on an index generator 22 and an encryption table 23.
- the index generator 22 may be a secure pseudo-random number generator, such as a stream-cipher operating in output-feedback mode (OFB).
- a stream-cipher in OFB-mode is capable of generating a series of indices 24, 25 from a short term input key 21.
- the size of the input key may be 64 or 128 bits.
- the encryption look-up table (LUT) 23 is a long-term table, or key, comprising a large number of entries.
- the encryption LUT is also referred to as E.
- the LUT size may be in the range between 128 KB to 128 MB.
- a size of 1 MB may be a typical size, the specific size of the LUT may be determined in a trade-off between security and size.
- the process is exemplified with integer entries of the look-up table and an integer value representation of the data signal, however it is to be understood that the process is not limited to this.
- the data signal is represented as a series of symbols.
- the symbol of the data signal is to be understood as any representation of the data signal, such a segments of the bit stream or the DCT coefficient, C n , of the signal in the transform domain, here represented by integer values.
- the look-up table 23 may be randomly generated at the server.
- a number of integers are illustrated at different entry positions, one entry denoted 26 is the negative integer -127, another entry denoted 27 is the positive integer +14.
- the type of entry reflects the signal representation into which the watermark is embedded. If for example the watermark is embedded into luminance pixel values of an image, the entries would range from 0 to 255. For other representations of the data signal, other entry types or values are used. For example, DCT coefficients may be represented by real values.
- a number of pointers or indexes 24, 25 are generated for each symbol of the data signal, here exemplified by two, however, any number such as 3, 4, 5, 10 or even more pointers may be applied.
- the encryption key 205 is subsequently combined (added) 202 with the symbol of the data signal, here exemplified with the number +128 as denoted by 206, resulting in an encrypted data symbol 203, in this case being +15 as denoted by 207.
- a modified, i.e. encrypted coefficient may be expressed as:
- FIG. 3 illustrates an embodiment of the decryption and watermarking process 30 in accordance with the decryption and watermarking scheme of FIG. 1.
- the server constructs the long-term decryption table 33 Dk.
- the user may be a specific end user, a group of end-users, or the like.
- the user-specific watermark is referred to as Wk.
- the entries of JF ⁇ may be random variables with a variance much less than E.
- the watermark is also in the form of a LUT typically of the same size as E.
- the decryption and watermarking is performed at the client side 16, by generating indices and modifying the data with the LUT corresponding to these indices.
- indices are generated by an index generator 22 (stream-cipher operating in the OFB-mode).
- the short term input key 21 is used for generating the corresponding sequence or series of pointers 34,35 t n , as in connection with the encryption of the data.
- the watermarking of the encryption table slightly alters entries of the table entries.
- the corresponding watermark LUT 53 is illustrated in FIG. 5.
- the decryption key is subsequently combined 302 with the symbol of the encrypted data signal, here exemplified with the number +15 as denoted by 207 (the resulting encrypted symbol of FIG. 2), resulting in a decrypted, but watermarked, data symbol, in this case being +131 as denoted by 307.
- FIG. 4 schematically illustrates an embodiment of a scheme 40 for detecting a watermark in a data signal in accordance with the present invention
- the scheme may be implemented in a watermark detector.
- Watermark detection may be performed on data possibly including a watermark, e.g. on suspect data, the detection process may be performed at a secure server site having access to the watermark to be detected.
- the data signal 47 possibly including a watermark is received at a signal unit 41, and optionally the watermark is estimated at an estimator unit 46 from the received data signal.
- the watermark estimation may e.g. be the application of a high-pass filter which may enhance the watermark signal, other types of watermark estimation method may be used. Detection of the watermark may, however, also be conducted on the data signal in the received form.
- the input key 21 used for generating the sequence of entries for the watermark possibly in the data signal is inputted into the secure index generator 22, and the relevant entries of a watermark LUT 45, is extracted at a table unit 42 and the watermark is generated therefrom. Subsequently the presence 48 of the generated watermark is detected at a detector unit 43 in the signal by comparing the data signal or estimated watermark with the watermark deduced from the watermark LUT.
- FIG. 5 illustrates an embodiment of the detecting procedure 50 in accordance with the detection scheme of FIG. 4.
- indices 54, 55 are generated by an index generator 21, 22 (a stream-cipher operating in the OFB-mode). The indices are used together with the watermark LUT 53 to reconstruct the watermark sequence.
- the watermark LUT is the difference LUT between the encryption and the decryption LUT. In the given example all but a few of the entries are zero, however more entries, most entries or even all entries may include finite (typically small) values.
- the estimated watermark value is correlated 503 with the watermark values deduced from the watermark LUT 53.
- the correlation result is compared to a threshold value 504 so as to determine 505 whether or not the investigated (or suspected) data did in fact contain the watermark in question.
- FIG. 6 schematically illustrates another embodiment of a scheme 60 for detecting a watermark in a data signal in accordance with the present invention, the scheme may be implemented in a watermark detector.
- the data signal 67 possibly including a watermark is received at a signal unit 64 and optionally the watermark is estimated from the received data signal at an estimator unit 66.
- the input key 21 and the index generator 22 are used for generating and extracting the relevant entries as before.
- the segments, or symbols, of the data signal corresponding to the sequence of indices are accumulated in an accumulation LUT by an accumulation unit 63.
- the watermark 62 is detected by a detector unit 61 in the signal by correlating the accumulation LUT with the watermark LUT.
- the received data signal is rearranged in an accumulation table so that the relevant segments of the data signal are arranged in accordance with the entries generated by the secure index generator 22.
- FIG. 7 illustrates an embodiment of the detecting procedure 70 in accordance with the detection scheme of FIG. 6.
- indices are generated by an index generator 22 and the input key 21.
- the data is received 71 and the watermark is optionally estimated 72 therefrom.
- the symbol of the data signal is extracted, here exemplified by the integer -2 as denoted by 706.
- the symbols of the data signal are accumulated 73 in an accumulation table 74 in accordance with the series of indices as generated by the index generator.
- the accumulation table is initially empty. In the situation that the entries of the symbol of the data signal correspond to t2n and t2n + i, the symbol is inserted into the accumulation table 74 at these positions 75, 76. Once the entire accumulation table has been constructed, the accumulation table is correlated 77 with the watermark LUT 53 of the watermark.
- the correlation result is compared to a threshold value 78 so as to determine 79 whether or not the data signal did in fact contain the watermark in question.
- a threshold value 78 so as to determine 79 whether or not the data signal did in fact contain the watermark in question.
- the present invention may however also be applied in connection with multiplicative watermarking. In this case, addition and subtraction are replaced by multiplication and division.
- different watermarks can be embedded into the same data signal by using different decryption tables on the encrypted signal.
- the decryption tables may be based on corresponding, but different, watermark tables.
- these watermark tables may be derived from a common reference table.
- the watermark tables are generated by circularly shifting the reference table.
- the detection process may be performed by a computation of the correlation between the accumulation table and all different watermark tables, such a correlation computation may in accordance with the present invention be performed in an efficient manner.
- the efficient computation involves correlating the accumulation table with the reference table. This process may be performed in the frequency domain by determining a correlation vector, C, as:
- the watermarking method and apparatus also comprise perceptual masking.
- Perceptual masking refers to local and/or global adjustments to the watermark strength in accordance with the human audio-visual perception. Exploiting the human perception characteristics renders it possible to embed a stronger watermark signal to the digital content, thus improving the robustness against malicious attacks, without any adverse effects on the perceptual quality of the watermarked digital object.
- the process of perceptual masking typically involves applying a perceptual mask filter h(.) to the watermark w.
- the mask is preferably computed from the digital content in advance of the actual watermark embedding process. If such advance computing is not possible or feasible, a generic mask filter may be used.
- the mask filter h(.) can not be applied to the watermark Wk, because the watermark as such is not accessible. Instead, the filter h(.) is applied to the encryption key (i.e. the sequence of entries of encryption table 23 as added by adder 200 in FIG.2) and to the decryption key (i.e. the sequence of added entries of decryption table 33 in FIG.3).
- the perceptual masking operation can be illustrated as follows:
- the decryption key Dk(t) differs from E(t) by the client-specific watermark wk:
- the invention relates to embedding a spread spectrum watermark in a data signal as well as to detection of the embedded watermark.
- a data signal is encrypted or received in the form of an encrypted data signal, the signal being encrypted by modifying it in accordance with one or more entries of a look-up-table in which an encryption table is stored.
- the encryption is carried out by a first computing device such as a server device.
- the watermark is actually embedded while decrypting the signal. This takes place in a second computing device, possibly in a client device, in a similar manner.
- the client device employs a decryption table, which is a modified (i.e. watermarked) version of the encryption table.
- the decryption table may generated by the server and securely communicated to the client.
- the data signal is decrypted in accordance with entries of a look-up-table.
- the look-up-tables in server and client are addressed by the same sequence of pointers generated by respective index generators.
- the mismatch between encryption table and decryption table causes the decrypted signal to have an embedded watermark.
- the invention can be implemented in any suitable form including hardware, software, firmware or any combination of these.
- the invention or some features of the invention can be implemented as computer software running on one or more data processors and/or digital signal processors.
- the elements and components of an embodiment of the invention may be physically, functionally and logically implemented in any suitable way. Indeed, the functionality may be implemented in a single unit, in a plurality of units or as part of other functional units. As such, the invention may be implemented in a single unit, or may be physically and functionally distributed between different units and processors.
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/295,650 US20090136026A1 (en) | 2006-04-03 | 2007-03-29 | Watermark embedding using look-up tables |
EP07735306A EP2005385A1 (en) | 2006-04-03 | 2007-03-29 | Watermark embedding using look-up tables |
JP2009503706A JP2009532975A (en) | 2006-04-03 | 2007-03-29 | Watermark embedding using look-up table |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06112166 | 2006-04-03 | ||
EP06112166.1 | 2006-04-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007113746A1 true WO2007113746A1 (en) | 2007-10-11 |
Family
ID=38430444
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2007/051107 WO2007113746A1 (en) | 2006-04-03 | 2007-03-29 | Watermark embedding using look-up tables |
Country Status (5)
Country | Link |
---|---|
US (1) | US20090136026A1 (en) |
EP (1) | EP2005385A1 (en) |
JP (1) | JP2009532975A (en) |
CN (1) | CN101416215A (en) |
WO (1) | WO2007113746A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009273054A (en) * | 2008-05-09 | 2009-11-19 | Mitsubishi Electric Corp | Encrypted communication system |
JP2010539535A (en) * | 2007-09-13 | 2010-12-16 | イルデト・ビー・ヴイ | Content encryption |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4885892B2 (en) * | 2008-02-22 | 2012-02-29 | 株式会社ソニー・コンピュータエンタテインメント | Terminal device, information providing system, file access method, and data structure |
CN101645909B (en) * | 2009-09-11 | 2012-12-12 | 中山大学 | Multi-media information security guarantee method combining encryption and watermark |
WO2013018683A1 (en) * | 2011-07-29 | 2013-02-07 | 日本電気株式会社 | System for generating index resistant against divulging of information, index generation device, and method therefor |
NL2007557C2 (en) * | 2011-10-10 | 2013-04-11 | Civolution B V | Watermark detection with payload. |
US9465954B1 (en) * | 2013-03-15 | 2016-10-11 | Dataguise Inc. | Method and system for tracking masking of data |
CN106228502B (en) * | 2016-07-15 | 2018-01-23 | 北华航天工业学院 | The digital watermark embedding and extracting method of satellite remote-sensing image tiff file |
CN108830772A (en) * | 2018-05-25 | 2018-11-16 | 珠海奔图电子有限公司 | Watermark encoder conversion method and device |
US10937117B2 (en) * | 2018-07-20 | 2021-03-02 | Comcast Cable Communications, Llc | Collusion attack prevention |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020009208A1 (en) * | 1995-08-09 | 2002-01-24 | Adnan Alattar | Authentication of physical and electronic media objects using digital watermarks |
JPH11232779A (en) * | 1997-11-20 | 1999-08-27 | Toshiba Corp | Copy preventing device |
US7228437B2 (en) * | 1998-08-13 | 2007-06-05 | International Business Machines Corporation | Method and system for securing local database file of local content stored on end-user system |
JP2002268949A (en) * | 2001-03-12 | 2002-09-20 | Pioneer Electronic Corp | Duplicate managing method, duplicate managing device, recording medium and program |
AU2003202530A1 (en) * | 2002-04-01 | 2003-10-16 | Sony Corporation | Reproducing method, reproducing apparatus, recording method, and recording apparatus |
-
2007
- 2007-03-29 US US12/295,650 patent/US20090136026A1/en not_active Abandoned
- 2007-03-29 CN CNA2007800123616A patent/CN101416215A/en active Pending
- 2007-03-29 WO PCT/IB2007/051107 patent/WO2007113746A1/en active Application Filing
- 2007-03-29 JP JP2009503706A patent/JP2009532975A/en not_active Withdrawn
- 2007-03-29 EP EP07735306A patent/EP2005385A1/en not_active Withdrawn
Non-Patent Citations (6)
Title |
---|
ANDERSON R ET AL: "CHAMELEON - A NEW KIND OF STREAM CIPHER", FAST SOFTWARE ENCRYPTION. INTERNATIONAL WORKSHOP, 1997, pages 107 - 113, XP000865617 * |
ANDRÉ ADELSBACH ET AL: "Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages", 2006, INFORMATION SECURITY AND PRIVACY LECTURE NOTES IN COMPUTER SCIENCE;;LNCS, SPRINGER-VERLAG, BE, PAGE(S) 136-147, ISBN: 3-540-35458-1, XP019035482 * |
FABIEN A P PETITCOLAS ET AL: "Information Hiding-A Survey", PROCEEDINGS OF THE IEEE, IEEE. NEW YORK, US, vol. 87, no. 7, July 1999 (1999-07-01), XP011044235, ISSN: 0018-9219 * |
KARTHIK K ET AL: "Joint fingerprinting and decryption for multimedia content tracing in wireless networks", PROCEEDINGS OF THE SPIE, SPIE, BELLINGHAM, VA, US, vol. 5403, no. 1, 12 April 2004 (2004-04-12), pages 360 - 370, XP002436643, ISSN: 0277-786X * |
KUNDUR D ET AL: "Video Fingerprinting and Encryption Principles for Digital Rights Management", PROCEEDINGS OF THE IEEE, IEEE. NEW YORK, US, vol. 92, no. 6, June 2004 (2004-06-01), pages 918 - 932, XP011112769, ISSN: 0018-9219 * |
PETITCOLAS F A P ET AL: "ATTACKS ON COPYRIGHT MARKING SYSTEMS", INFORMATION HIDING. INTERNATIONAL WORKSHOP PROCEEDINGS, XX, XX, 14 April 1998 (1998-04-14), pages 218 - 238, XP000997250 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010539535A (en) * | 2007-09-13 | 2010-12-16 | イルデト・ビー・ヴイ | Content encryption |
JP2009273054A (en) * | 2008-05-09 | 2009-11-19 | Mitsubishi Electric Corp | Encrypted communication system |
Also Published As
Publication number | Publication date |
---|---|
US20090136026A1 (en) | 2009-05-28 |
CN101416215A (en) | 2009-04-22 |
EP2005385A1 (en) | 2008-12-24 |
JP2009532975A (en) | 2009-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090136026A1 (en) | Watermark embedding using look-up tables | |
JP5346024B2 (en) | Content encryption | |
US8811655B2 (en) | Circumvention of watermark analysis in a host content | |
US7616776B2 (en) | Methods and apparatus for enhancing the robustness of watermark extraction from digital host content | |
Katzenbeisser et al. | A buyer–seller watermarking protocol based on secure embedding | |
El-Khamy et al. | A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption | |
WO2009031082A1 (en) | Apparatus and methods for transferring digital content | |
Lemma et al. | Secure watermark embedding through partial encryption | |
EP1880344A2 (en) | Security enhancements of digital watermarks for multi-media content | |
Tanha et al. | An overview of attacks against digital watermarking and their respective countermeasures | |
Xu et al. | Separable reversible data hiding in encrypted images based on two-dimensional histogram modification | |
Prasad et al. | A secure fragile watermarking scheme for protecting integrity of digital images | |
Cayre et al. | Watermarking security part one: Theory | |
Craver et al. | Copyright protection protocols based on asymmetric watermarking: The ticket concept | |
Celik et al. | Secure embedding of spread spectrum watermarks using look-up-tables | |
Patil et al. | Digital audio watermarking: techniques, applications, and challenges | |
Dhavale et al. | Lossless audio watermarking based on the alpha statistic modulation | |
Mehta et al. | Secure audio watermarking based on Haar wavelet and discrete cosine transform | |
Daham | Encryption Based Watermarking Technique For Security Of Medical Image | |
Chauhan | Digital watermarking-revisit | |
Jain et al. | Multi-level Secure Mechanism For Audio Watermarking. | |
Shefali et al. | Attack detection through image adaptive self embedding watermarking | |
JP2004506379A (en) | Method and system for embedding information bits steganographically in a source signal | |
Xie et al. | Secure Digital Content Management in Library | |
van der Veen et al. | Forensic Watermarking in Digital Rights Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07735306 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007735306 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009503706 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12295650 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 5338/CHENP/2008 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200780012361.6 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |